We are hands-on education, driven by materials and mentorship from real capable cyber warriors. We do range projects that generate new technologies, practices, etc.
We operate a real threat intelligence security operation center where people can train to be capable Blue Team using real data and various industry tools.
The range's blue teamers are utilizing our internally developed tools, technologies, and practices. People we know we can trust get to experience those too.
We have lots of partners, corporations, government entities, etc. All of them would be interested in potential commercial development of new intellectual property. We are a 501c3 and so are not in the business of business. However, we are always grateful when people make substantial donations to us: sharing their success with us.
When one considers the totality of what we are, and what we are not, one sees clearly why there is nothing like us. Nor will there be without our help.

What really gets me about @blscott is his never-ending passion to protect everybody from the bad stuff out there on the interwebs and his over-arching need to do the right thing for us. I’ll take @blscott and his incredible potty mouth over others’ authoritative blathering every time.

@Lord-Yimman-C Good question along with pushing ethical boundaries. I'm sure nobody would volunteer to have intercourse with a known HIV positive person in a control group experiment.. There are ways to test the a host cell with it's CCR5 protein bond snipped and purposely infect it with the HIV virus to see if the infection gets passed to the host cell. If not then the case can be made that it would work on a large scale cell body (I.E. humans).
Source Reading:
https://ghr.nlm.nih.gov/gene/CCR5#synonyms

@blscott I just want to say that being chosen as this forum’s best tune is a compliment that I’ll, like, remember for as long as I can. Maybe I should get out of security and become a veterinarian because I love children.

I created this yesterday and am posting it in the wild and saw Brett's post.
The U.S. is facing a labor shortage of talented, qualified, and passionate cyber security candidates. The number of vacant positions is expected to grow each year. This is not a good sign, though, as the work being performed by those in the field is important and, at times, demanding.
For each unfilled position, those already working are being expected to carry the load. This increases the chance of burnout and human error. An over worked security employee is going to spend less time reviewing an alarm. Be dismissive of potential dangers. Even worse is a passionate employee doing their best and not getting to an alarm or IoC before damage is done.
An employee may be fired for negligence, which was created by the company, but that is OK, right? This newly freed person is in high demand and can find work else where likely making more money. This person taking their cavalier attitude with them and ultimately bringing nothing to the new company in value. There is a light at the end of the tunnel.
The Arizona Cyber Warfare Range (AZCWR / NCWF) is working with cities, corporations, and educational entities. Helping create passionate and qualified Cyber Security Warriors. Giving them the skills they need to lead and confidence to make decisions. America does not need 3.5 million more open positions.
We need leaders that understand the threats they face.
We need leaders that understand there is no one SIEM to rule them all.
We need leaders that understand a degree or certification does not mean skilled.
The Arizona Cyber Warfare Range / National Cyber Warfare Foundation continues to produce the best and brightest. All we ask from our volunteers and learners is a desire to learn and willingness to fail. Join us in making a difference.
AZCWR Forums
“I haven’t failed. I’ve just found 10,000 ways that won’t work.” Thomas Edison

@Nemesis Yea I like LAPS but I knew asking the question here would help get another perspective. I live that everything is hackable, so with that thought, I look for that hole and either patch it or configure a "digital guard" to it.

This would be something the Board will need to approve as it may require us to sponsor an item. If we can set up an affiliate without linking to a product, that would be great.
I will do additional research and follow up internally if it is something that matches our agenda.

Maybe not the best information but it looks complicated for the uninformed to figure it out.
Running Raspi 3 with Kali linux OS. It does work but its slower than duck shit thru a tin horn. In just 15 minutes along side an HP core i3 w/ Win 8.1 the accepted hashes are 9 (Raspi 3) and 53 (HP). 2.1 hashes per sec from the Pi vs 16 from the HP.
How is monero mined?
Monero is a privacy-focused coin which currently sits around the top 10 of Cryptocurrencies by marketcap. Mining Monero can be a profitable venture due to its cryptographic algorithm which is resistant to ASIC's mining. This means that anyone with a CPU or GPU can mine for Monero.Dec 1, 2017
How to Mine Monero (XMR): Complete Beginner's Guide - Blockonomi
https://blockonomi.com/how-to-mine-monero/
How many hashes are in a monero?
As of 5/26/18, the current estimated hashes need to mine one Monero block is 51,045,600,000 hashes.
How many hashes does it take to mine one Monero coin? - Quora
https://www.quora.com/How-many-hashes-does-it-take-to-mine-one-Monero-coin
https://www.cryptocompare.com/coins/xmr/forum